A. The ephone hunt group is mandatory.B. Either the ephone hunt group or the voice hunt group is acceptable.C. Hunt group members must be SCCP IP phones.D. Hunt group members can include both SCCP or SIP IP phones.E. Hunt group members must be SIP IP phones.F. The member hunting mechanism must be set to sequential.

QUESTION 42Which call hunt mechanism is only supported by the voice hunt group in a Cisco Unified Communications Manager Express router?

A. sequentialB. peerC. longest idleD. parallelE. overlay

Answer: DExplanation:Parallel Hunt-Group, allows a user to dial a pilot number that rings 2-10 different extensions simultaneously. The first extension to answer gets connected to the caller while all other extensions will stop ringing. A timeout value can be set whereas if none of the extensions answer before the timer expires, all the extensions will stop ringing and one final destination number will ring indefinitely instead. The final number could be another voice hunt-group pilot number or mailbox The following features are supported for Voice Hunt-Group:Calls can be forwarded to Voice Hunt-GroupCalls can be transferred to Voice Hunt-GroupMember of Voice Hunt-Group can be SCCP, ds0-group, pri-group, FXS or SIP phone/trunkMax member of Voice Hunt-Group will be 32

A. It leverages HSRP for router redundancy and GLBP for load sharing between a pair of routers.B. Cisco Unified Border Element session information is check-pointed across the active and standby router pair.C. It supports media and signal preservation when a switchover occurs.D. Only media streams are preserved when a switchover occurs.E. It can leverage either HSRP or VRRP for router redundancy.F. The SIP media signal must be bound to the loopback interface.

Answer: BD

QUESTION 45Refer to the exhibit. From this NFAS-enabled T1 PRI configuration on a Cisco IOS router, how many bearer channels are available to carry voice traffic?

A. 91B. 92C. 93D. 94E. 95

Answer: DExplanation:In NFAS one channel is used for signaling so according to this we will have 94 channel for with bearer capability.

QUESTION 46Refer to the exhibit. Assuming this NFAS-enabled T1 PRI configuration on a Cisco IOS router is fully functional, what will the controller T1 1/1 D-channel status be in the output of the show isdn status command?

Answer: BExplanation:TEI_ASSIGNED, which indicates that the PRI does not exchange Layer 2 frames with the switch. Use the show controller t1 x command to first check the controller t1 circuit, and verify whether it is clean (that is, it has no errors) before you troubleshoot ISDN Layer 2 problem with the debug isdn q921.

QUESTION 47Refer to the exhibit. In an effort to troubleshoot a caller ID delivery problem, a customer emailed you the voice port configuration on a Cisco IOS router. Which type of voice port is it?

A. FXSB. E&MC. BRID. FXOE. DID

Answer: D

QUESTION 48The iLBC codec operates at 38 bytes per sample per 20-millisecond interval. What is its codec bit rate in kilobits per second?

A. 6.3B. 13.3C. 15.2D. 16E. 24

Answer: CExplanation:The internet Low Bit Rate Codec (iLBC) is designed for narrow band speech and results in a payload bit rate of 13.33 kbits per second for 30-millisecond (ms) frames and 15.20 kbits per second for 20 ms frames. When the codec operates at block lengths of 20 ms, it produces 304 bits per block, which is packetized as defined in RFC 3952. Similarly, for block lengths of 30 ms it produces 400 bits per block, which is packetized as defined in RFC 3952.The iLBC has built-in error correction functionality to provide better performance in networks with higher packet loss

QUESTION 49Assume 6 bytes for the Layer 2 header, 1 byte for the end-of-frame flag, and a 40-millisecond voice payload, how much bandwidth should be allocated to the strict priority queue for five VoIP calls that use a G.729 codec over a multilink PPP link?

A. 87 kb/sB. 134 kb/sC. 102.6 kb/sD. 77.6 kb/sE. 71.3 kb/s

Answer: AExplanation:Voice payloads are encapsulated by RTP, then by UDP, then by IP. A Layer 2 header of the correct format is applied; the type obviously depends on the link technology in use by each router interface: A single voice call generates two one-way RTP/UDP/IP packet streams. UDP provides multiplexing and checksum capability; RTP provides payload identification, timestamps, and sequence numbering.

QUESTION 50Assume 20 bytes of voice payload, 6 bytes for the Layer 2 header, 1 byte for the end-of-frame flag, and the IP, UDP, and RTP headers are compressed to 2 bytes, how much bandwidth should be allocated to the strict priority queue for six VoIP calls that use a G.729 codec over a multilink PPP link with cRTP enabled?

A. 80.4 kb/sB. 91.2 kb/sC. 78.4 kb/sD. 69.6 kb/sE. 62.4 kb/s

Answer: DExplanation:Voice payloads are encapsulated by RTP, then by UDP, then by IP. A Layer 2 header of the correct format is applied; the type obviously depends on the link technology in use by each router interface: A single voice call generates two one-way RTP/UDP/IP packet streams. UDP provides multiplexing and checksum capability; RTP provides payload identification, timestamps, and sequence numbering.

QUESTION 31Refer to the exhibit. Your junior design engineer presents this configuration design. What is the next-hop router for CE3, and why?

A. CE1. BGP weight is higher than CE2.B. CE2. EBGP administrative distance is lower than RIP.C. CE2. The link between CE2 and PE1 has more bandwidth than CE1-to-PE1.D. CE1. HSRP on CE1 is in active state.

Answer: A

QUESTION 32A service provider creates a network design that runs MPLS in its WAN backbone using OSPF as the IGP routing protocol. What would be two effects of additionally implementing MPLS-TE? (Choose two.)

A. MPLS-TE is required to reroute traffic within less than 1 second in case of a link failure inside thebackbone.B. MPLS-TE is required to route different MPLS QoS service classes through different paths.C. MPLS-TE and OSPF cannot be used together inside one MPLS network.D. MPLS-TE cannot use OSPF for the traffic path calculation.E. MPLS-TE is required to create backup paths independently from the IGP.

QUESTION 35You are evaluating convergence characteristics of various interior gateway protocols for a new network design. Which technology allows link-state routing protocols to calculate paths to destination prefixes that are functionally similar to feasible successors in Enhanced Interior Gateway Routing Protocol?

QUESTION 36You are hired to design a solution that will improve network availability for users on a campus network with routed access. If the budget limits you to three components, which three components would you recommend in your design proposal? (Choose three.)

A. redundant power supplies in the access routersB. standby route processors for SSO in the core routersC. standby route processors for SSO in the distribution routersD. standby route processors for SSO in the access routersE. replace copper links between devices with fiber links

Answer: ADE

QUESTION 37You are designing a network to support data, voice and video. Which two main factors will you address to improve network convergence? (Choose two.)

QUESTION 38Refer to the exhibit. This diagram depicts the design of a small network that will run EIGRP on R1 and R2, and EIGRP Stub on R3. In which two ways will this network be impacted if there is link instability between R1 and R2? (Choose two.)

A. R1 will have routes in its routing table that originate from R2 and R3.B. R3 will have routes in its routing table that originate from R1 and R2.C. R2 will have routes in its routing table that originate from R1 and R3.D. R3 will be transit for traffic between R1 and R2.E. R3 will not be transit for traffic between R1 and R2.

QUESTION 31After the completion of a site survey with Ekahau Site Survey tool, using the default color palette, it is noted that multiple areas are shown as white on the heat map when viewing 5 GHz signal strength data. What does this indicate about the signal strength?

A. The area is below the minimum threshold configured on the tool.B. The area is below the detectable level and indicates no RF signal.C. The area is below -100 dBm at coverage cell edge.D. The area is below -67 dBm at coverage cell edge.

Answer: A

QUESTION 32An engineer must design wireless coverage in thick-walled stairwells. Which information should the engineer refer to when determining where APs can be installed?

A. Local or National Building CodeB. IEEEC. BICSI TDMMD. Cisco Hardware Installation Guide

Answer: D

QUESTION 33An engineer is performing a predictive wireless design for a medical treatment environment, which requires data and voice services. Which of the following is a requirement for the design?

QUESTION 34A network engineer is preparing for an office site survey with a height of 2.5 meters. Which three components are recommended to complete the survey? (Choose three.)

A. Use APs with external antennas.B. Use DoS attack on APs while measuring the throughput.C. Use APs with built-in antennas.D. Use a battery pack to power APs.E. Use a drawing of the office space to draw AP and client placements.F. Use APs with directional antennas.

Answer: CDE

QUESTION 35An engineer is planning for a 24 Mbps data rate for a new installation.What is the coverage area from the AP if the environment and other factors are not taken into consideration?

A. 225 feetB. 80 feetC. 150 feetD. 100 feet

Answer: A

QUESTION 36Which two options describe best practices that must be completed after a wireless installation is finished? (Choose two.)

A. Make sure that there are no spaces between the devices on the rack that the Wireless Lan Controller isinstalled.B. Consult with the customer to ensure that the IT staff has a complete set of design and installationdocuments.C. Make sure the customer is aware that they should consider purchasing a support contract immediately afterthe installation is complete.D. Spend time with the customer to show them the controller GUI and inform them how they can reach theCisco TAC if they have any problems.E. Test all the customer’s wireless devices and applications to ensure they are working properly.

Answer: BE

QUESTION 37A customer is deploying a Greenfield 802.11ac network on a floor that will support approximately 300 wireless devices. Which setting needs to be changed on Prime Infrastructure Planning Tool in order to predict the amount of access points the customer needs to service the new floor?

QUESTION 38What is the recommended minimum speed at the edge of the cells in an 802.11g network for a good Cisco VoWLAN deployment?

A. 11 Mb/sB. 36 Mb/sC. 12 Mb/sD. 18 Mb/s

Answer: C

QUESTION 39An engineer is conducting a location readiness test and wants a selected point to be considered location-ready. Which three possible configurations reflect the minimum number of APs needed? (Choose three.)

A. One AP is resident in each quadrant surrounding the point-in-question.B. One AP per 1400 sq. ft. on the map.C. Two APs are resident in each quadrant surrounding the point-in- question.D. Four APs are deployed on the floor.E. Three APs are within 70 feet (21 meters) of the point-in- questionF. Three APs are deployed on the floor.

QUESTION 33An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds.Which setting of the preemption delay timer minimizes the loss of traffic?

Answer: AExplanation:https://www.cisco.com/c/en/us/td/docs/security/nac/appliance/configuration_guide/47/cam/47cam-book/m_intro.html“Cisco NAC Appliance compliance policies reduce the threat of computer viruses, worms, and other malicious code on your network. Cisco NAC Appliance is a powerful tool that enables you to enforce network access requirements, detect security threats and vulnerabilities on clients, and distribute patches, antivirus and antispyware software. It lets you block access or quarantine users who do not comply with your security requirements, thereby stopping viruses and worms at the edge of the network, before they can do harm.”

QUESTION 35Refer to the exhibit. A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario?

A. transparent mode with the servers on the same subnetB. routed mode with three security zonesC. transparent mode with three security zonesD. routed mode with two security zones

Answer: B

QUESTION 36Which route summarization most efficiently reduces perceived network complexity that is composed of subnetworks ranging from 172.16.20.0/24 to 172.16.36.0/24?

QUESTION 31A Cisco IOS SSL VPN gateway is configured to operate in clientless mode so that users can access file shares on a Microsoft Windows 2003 server. Which protocol is used between the Cisco IOS router and the Windows server?

A. HTTPSB. NetBIOSC. CIFSD. HTTP

Answer: C

QUESTION 32You are configuring a Cisco IOS SSL VPN gateway to operate with DVTI support. Which command must you configure on the virtual template?

A. AES-GCM and SHA-2B. 3DES and DHC. AES-CBC and SHA-1D. 3DES and SHA-1

Answer: A

QUESTION 40An administrator wishes to limit the networks reachable over the Anyconnect VPN tunnels. Which configuration on the ASA will correctly limit the networks reachable to 209.165.201.0/27 and 209.165.202.128/27?

A. the sensor, which contains one or more probesB. the probe managerC. a monitoring tool that connects to the Cisco ISED. the trigger, which activates ACLsE. an analyzer, which uses configured policies to evaluate endpointsF. a remitter tool, which fails over to redundant profilers

Answer: ABE

QUESTION 32Which three statements about the Cisco ISE profiler are true? (Choose three.)

A. It sends endpoint data to AAA servers.B. It collects endpoint attributes.C. It stores MAC addresses for endpoint systems.D. It monitors and polices router and firewall traffic.E. It matches endpoints to their profiles.F. It stores endpoints in the Cisco ISE database with their profiles.

Answer: BEF

QUESTION 33From which location can you run reports on endpoint profiling?

QUESTION 35What is a requirement for posture administration services in Cisco ISE?

A. at least one Cisco router to store Cisco ISE profiling policiesB. Cisco NAC Agents that communicate with the Cisco ISE serverC. an ACL that points traffic to the Cisco ISE deploymentD. the advanced license package must be installed

Answer: D

QUESTION 36Which two statements about Cisco NAC Agents that are installed on clients that interact with the Cisco ISE profiler are true? (Choose two.)

A. They send endpoint data to AAA servers.B. They collect endpoint attributes.C. They interact with the posture service to enforce endpoint security policies.D. They block access from the network through noncompliant endpoints.E. They store endpoints in the Cisco ISE with their profiles.F. They evaluate clients against posture policies, to enforce requirements.

Answer: CF

QUESTION 37What steps must you perform to deploy a CA-signed identify certificate on an ISE device?

A. 1. Download the CA server certificate.2. Generate a signing request and save it as a file.3. Access the CA server and submit the ISE request.4. Install the issued certificate on the ISE.B. 1. Download the CA server certificate.2. Generate a signing request and save it as a file.3. Access the CA server and submit the ISE request.4. Install the issued certificate on the CA server.C. 1. Generate a signing request and save it as a file.2. Download the CA server certificate.3. Access the ISE server and submit the CA request.4.Install the issued certificate on the CA server.D. 1. Generate a signing request and save it as a file.2. Download the CA server certificate.3. Access the CA server and submit the ISE request.4. Install the issued certificate on the ISE.

Answer: D

QUESTION 38What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?

A. the ISEB. an ACLC. a routerD. a policy server

Answer: A

QUESTION 39What are the initial steps must you perform to add the ISE to the WLC?

A. 1. With a Web browser, establish an HTTP connection to the WLC pod.2, Navigate to Administration > Authentication > New.3. Enter server values to begin the configuration.B. 1. With a Web browser, establish an FTP connection to the WLC pod.2. Navigate to Security > Administration > New.3. Add additional security features for FTP authentication.C. 1. With a Web browser, establish an HTTP connection to the WLC pod.2. Navigate to Authentication > New.3. Enter ACLs and Authentication methods to begin the configuration.D. 1. With a Web browser connect, establish an HTTPS connection to the WLC pod.2. Navigate to Security > Authentication > New.3. Enter server values to begin the configuration.

QUESTION 35When troubleshooting redundant interface operations on the Cisco ASA, which configuration should be verified?

A. The nameif configuration on the member physical interfaces are identical.B. The MAC address configuration on the member physical interfaces are identical.C. The active interface is sending periodic hellos to the standby interface.D. The IP address configuration on the logical redundant interface is correct.E. The duplex and speed configuration on the logical redundant interface are correct.

Answer: D

QUESTION 36On the Cisco ASA, where are the Layer 5-7 policy maps applied?

QUESTION 35Drag and Drop QuestionDrag the characteristic on the left to the appropriate Cisco UCS adapter on the right, where the adapter supports that characterishtic.

Answer:

QUESTION 36Drag and Drop QuestionThe Cisco Integrated Management Controller on a Cisco Unified Computing B-Series server provides a number of features. Drag the functionality on the left to the appropriate feature on the right.